article thumbnail

A people counter that didn’t add up and the dangers of the COVID IoT boom

SC Magazine

According to its website, the London-headquartered firm has been operating since 2002 and counts a wide range of users, from L’Occitane to Levis, casinos to libraries. ” The lesson for chief information security officers extends beyond a single IoT device that might have a vulnerability — lots of devices do. Recent U.S.

IoT 121
article thumbnail

Disable Time Sync NOW—Ugly GPSd Bug Brings Sunday FAILs

Security Boulevard

On Sunday, you might find some equipment thinks it’s 2002. Yet another case of critical open source code being maintained by a single unpaid volunteer. The post Disable Time Sync NOW—Ugly GPSd Bug Brings Sunday FAILs appeared first on Security Boulevard.

IoT 124
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Episode 229: BugCrowd’s Casey Ellis On What’s Hot In Bug Hunting

The Security Ledger

Related Stories Spotlight: When Ransomware Comes Calling Episode 226: The Cyber Consequences Of Our Throw Away Culture Spotlight: Automation Beckons as DevOps, IoT Drive PKI Explosion. When the first bugs for cash programs emerged almost two decades ago, they were controversial.

article thumbnail

2020 Predictions: New Challenges for Data Privacy and the 5G Hackathon

Thales Cloud Protection & Licensing

The adoption of emerging technologies like 5G will fuel the proliferation of Internet of Things (IoT) that’s often built with only a few security controls and therefore creating a larger attack surface that enterprises have to deal with., 5G tech will make the IoT a greater part of our everyday lives. Conclusion.

article thumbnail

Top 20 Cybersecurity Companies You Need to Know in 2025

eSecurity Planet

Known for strong next-generation firewalls (NGFW) and endpoint detection and response (EDR) products, it also ranks for network security tools , zero trust , extended detection and response (XDR), IoT security , software-defined wide area network ( SD-WAN ), and secure access service edge (SASE). Visit Trend Micro 8. Visit Rapid7 16.

article thumbnail

CISA list of 95 new known exploited vulnerabilities raises questions

Malwarebytes

The oldest vulnerability on that list is CVE- 2002 -0367 , an almost 20 year old vulnerability in Windows NT and Windows 2000. Other interesting items on the list are some IoT vulnerabilities that got some fame in 2020 under the name Ripple20. Not so new. In fact, only 5 vulnerabilities were patched in 2022.

article thumbnail

Top SD-WAN Solutions for Enterprise Security

eSecurity Planet

Launched in 2002 and specializing in wireless networking , Aruba Networks’ success led to its acquisition by Hewlett-Packard in 2015. The vendor’s Secure SD-WAN product sits under Barracuda’s Network Protection solutions alongside zero trust access, industrial security for OT and IoT networks , and SASE.

Firewall 122